Surveillance

In the wake of the revelations that intelligence agencies have engaged in mass surveillance, both industry and society at large are looking for practicable encryption solutions which protect businesses and individuals. Previous technologies have failed in practice because they were too expensive or not user-friendly enough. German scientists have launched an open initiative called Volksverschlüsselung, which aims to bring end-to-end encryption to people.

To the general public, airships are familiar for their use as advertising blimps, but transportation engineers see airships as large, low-emissions transportation vessels which can carry large amounts of cargo into areas that lack infrastructure such as runways.The newHouse Cargo Airship Caucus aims to increase financial support for the use of lighter-than-air vehicles for carrying military cargo and humanitarian aid. “The unrealized potential [of blimps] is vast,” says one expert.. “Lack of funding is a big killer.”

Drones can be used for a number of applications including civilian and military purposes. Monitoring and surveillance are two of the biggest uses for drones. Now, researchers are utilizing similar technology to develop an operational prototype that will use innovative remote sensing approaches and cameras mounted on low cost aircraft or unmanned drones to detect and map fine scale transportation infrastructure damage such as cracks, deformations, and shifts immediately following natural disasters such as earthquakes, floods and hurricanes. The researchers hope the technology becomes the new, Department of Transportation approach to monitoring infrastructure after natural disasters.

James Clapper, the director of national intelligence, said that if Congress failed to reauthorize a controversial provision of the Patriot Act by June, then lawmakers who opposed the renewal of the provision – Section215 – would bear the blame if a terrorist attack, which could have been prevented by actions Section 215 permits, happened. Clapper said that if Congress decided not to renew the Patriot Act, or decided to renew it without Section 215, and an “untoward incident” occurred as a result, he hopes “everyone involved in that decision assumes responsibility” and does not just blame the intelligence community.

More than a year after President Barack Obama announced that he will work with Congress to curb the National Security Agency’s (NSA) dragnet surveillance program which collects large amounts of U.S. phone metadata, the Foreign Intelligence Surveillance Court approved last week a government request to continue allowing the agency to operate its bulk data collection until 1 June, when the legal authority for the program is set to expire. The required reauthorization of the program every ninety days has already been granted four other times — March, June, September, December — since Obama made his announcement in January 2014.

Following close to two decades of controversy and legal battles, the original inhabitants of the Chagos archipelago territories in the India Ocean, many of whom forcibly removed between 1967 and 1973 in order to allow the construction of military bases by Britain and the United States, may soon see their homeland again after the results of a new feasibility study. More than half of the 1,800 Chagossian people who were removed have died, but many of those remaining would like to return to the island chain, which includes a CIA base at Diego Garcia, one of the main islands.

Invasive school surveillance practices are the norm in the United Kingdom and the United States, and according to an Australian criminologist, such practices are becoming increasingly popular in Australian schools. “An estimated 1.28 million students are fingerprinted in the United Kingdom, largely for daily registration purposes; there is an excess of 106,000 closed-circuit television (CCTV) cameras installed in English, Welsh and Scottish secondary schools; while students in a U.S. high school use pedometers to ensure that they meet their gym class’s physical activity requirement,” he says.

A week after the Federal Aviation Authority(FAA) released its proposed rulesfor the commercial operation of small Unmanned Aerial Vehicles (UAVs), or drones, several American companies are considering moving their existing or future drone operations to Europe, where, these companies contend, regulations governing drone use are less onerous.

About seven months before the attacks on the Paris office of Charlie Hebdo, French domestic intelligence agency monitored Saïd Kouachi for at least two years, and his younger brother Chérif Kouachi for at least a year. The surveillance of both brothers had led nowhere, and was later considered a non-priority for intelligence officials. The Kouachi brothers did not appear to be an imminent threat, and it would have taken twenty-five agents to monitor the two brothers around the clock. Experts say that the failures and missteps by French law enforcement in the Kouachi case should be a lesson to other Western governments which may have relaxed surveillance practices targeted at would-be terrorists in order to comply with budget cuts or out of genuine concern for civil liberties.

Some 10,000 feet in the air above the Aberdeen Proving Ground in Maryland, the Pentagon has been testing its Joint Land Attack Cruise Missile Elevated Netted Sensor System (JLENS), meant to identify low-flying cruise missiles within a few hundred miles. Supporters of the program say that as cruise missiles become more widely available to U.S. enemies, the aerostats will become a preferred defense option, providing long-range radar much more consistently and cheaply than systems mounted on planes.Privacy advocates question whether privacy rights are being violated in the process.

In an effort to integrate UAVs, or drones, into U.S. airspace, the Federal Aviation Administration (FAA) plans to allow small commercial drones weighing up to fifty-five pounds to fly within sight of their remote pilots during daylight hours, according to the agency’s proposal for governing commercial drone flights. The drones must remain below 500 feet in the air and not exceed 100 mph.Industry advocates warned that drone research could move overseas if the U.S. government fails to quickly accept the widespread use of commercial drones.

When disaster strikes, it is important for responders and emergency officials to know what critical infrastructure has been damaged so they can direct supplies and resources accordingly. Researchers are developing a program that uses before-and-after aerial imagery to reveal infrastructure damage in a matter of minutes.

Monday’s drone incident on the White House lawn exposed a security gap that Secret Service and counterterrorism officials have been studying for years, but for which they have yet to develop a solution. Four days before the incident, lawmakers examining White House security protocols in response to a series of intrusions, were warned by a panel of experts that the Secret Service’s inability to identify and disable drones remained a top vulnerability, according to people with knowledge of the discussions.Security experts say proposals for a higher fence around the White House, together with increased surveillance and environmental sensors, are not enough to easily to identify and disable a drone before it lands.

The U.S. military’s investments in unmanned aircraft systems (UAS) have proven invaluable for missions from intelligence, surveillance, and reconnaissance (ISR) to tactical strike. Most of the current systems, however, require constant control by a dedicated pilot and sensor operator as well as a large number of analysts, all via telemetry. These requirements severely limit the scalability and cost-effectiveness of UAS operations and pose operational challenges in dynamic, long-distance engagements with highly mobile targets in contested electromagnetic environments. DARPA’s CODE program is offering the opportunity to participate in discussions to help develop groundbreaking software enabling unmanned aircraft to work together with minimal supervision.

In a Sunday morning interview on 970 AM The Answer, New York Police Department(NYPD) deputy commissioner for Intelligence and Counterterrorism John Miller criticized a 7-year old report on Islamic radicalization in New York City. The report, “Radicalization in the West: The Homegrown Threat,” published by the NYPD Intelligence Division under former police commissioner Ray Kelly, came under fire after a series of articlesdetailed some of the division’s counterterrorism operations, including the monitoring of prominent Muslims and Muslim communities in New York City. Those articles contributed to the closure of the unit, which conducted the NYPD’s surveillance operations on New York’s Muslim communities.

The long view

New report says the U.S. tech industry has under-performed as a result of concerns about the U.S. government’s electronic surveillance. The report estimates that the total economic impact on the U.S. tech sector of U.S. surveillance practices exceeds $35 billion annually. The report recommends policymakers level the playing field for the U.S. tech sector by implementing a series of reforms such as increasing the transparency of its surveillance practices, opposing government efforts to weaken encryption or introduce backdoors in software, and strengthening its mutual legal assistance treaties with other nations.

The British security services had to pull out agents from “hostile countries” as a result of information the Chinese and Russian intelligence services obtained when they gained access to the millions of top-secret NSA files Edward Snowed was carrying with him when he fled to Honk Kong and then to Russia. Snowden assured journalists who interviewed him that the Chinese and Russian intelligence services would not be able to access these files because he encrypted them with the highest encryption methods available. Security experts commented that he was either naïve or disingenuous – because he must have known, or should have known, that the cyber capabilities these two countries would make it relatively easy for them to crack the encrypted files he was carrying with him. We now know that these security experts were right.